Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

complex designs

biblio

Visible to the public Using computational game theory to guide verification and security in hardware designs

Submitted by grigby1 on Fri, 02/02/2018 - 1:17pm
  • Metrics
  • complex designs
  • composability
  • computational game theory
  • Computational modeling
  • Data protection
  • defender strategy
  • design network structure
  • embedded systems
  • formal methods
  • game theory
  • Games
  • Hardware
  • hardware validation
  • Hardware verification
  • Laboratories
  • verification costs
  • open-source synthesized hardware designs
  • optimal security deployment strategy
  • pubcrawl
  • Reliability
  • reliability threats
  • Resiliency
  • resource allocation
  • Safety
  • safety properties
  • security
  • security of data
  • Security Properties
  • Stackelberg security games model
  • system state space
  • valuable verification resource allocation

Terms of Use  |  ©2023. CPS-VO